A new and advanced phishing method has been developed, using blob URIs to evade Secure Email Gateways (SEGs) and avoid conventional security analysis tools. Cybersecurity experts have discovered that the attackers are employing these browser-created blob URLs to host credential harvesting pages in the victim's browser memory itself. Unlike traditional phishing pages that depend on external URLs, blob-based phishing attacks escape detection by embedding the malicious material in temporary data that can be accessed only by the user's session. The attack normally begins with an email with links to trusted, allowlisted sites such as Microsoft OneDrive, which presents the semblance of legitimacy. This technique is especially hazardous since it bypasses regular security measures. By employing blob URIs, attackers prevent themselves from leaving behind scannable or blockable URLs. Victims are initially directed to legitimate-appearing sites, then unknowingly redirected to a locally created blob URL serving a spoofed login page. The spoofed pages tend to appear as familiar services like Microsoft 365 or OneDrive and are intended to capture login credentials. Because the phishing page never actually resides on an external server, standard scanning and analysis techniques are unable to identify the threat, which leaves a crucial blind spot in most email and web security infrastructures. To protect against such attacks, organizations must deploy advanced threat detection software that can inspect browser activity and script execution instead of just URL scanning. User awareness training also needs to change, focusing on vigilance even when clicking on known domains. Anomaly-based monitoring for suspicious data exfiltration activities and implementing zero-trust access controls can also minimize exposure to such sophisticated phishing attacks.
React Server Components (RSC), the server-side rendering layer used in modern React and Next.js applications, has come under attention after researchers uncovered multiple security...
A new sophisticated phishing toolkit, Spiderman, has surfaced on cybercrime forums, allowing attackers to build highly convincing fake login pages for dozens of European banks and ...
MKVCinemas operated as a high-traffic piracy ecosystem that offered free access to copyrighted movies and TV shows without authorization, drawing significant global attention due t...